US20060234764A1 - Electronic device, operational restriction control method thereof and operational restriction control program thereof - Google Patents

Electronic device, operational restriction control method thereof and operational restriction control program thereof Download PDF

Info

Publication number
US20060234764A1
US20060234764A1 US11/239,401 US23940105A US2006234764A1 US 20060234764 A1 US20060234764 A1 US 20060234764A1 US 23940105 A US23940105 A US 23940105A US 2006234764 A1 US2006234764 A1 US 2006234764A1
Authority
US
United States
Prior art keywords
function
operational restriction
authentication information
operating
electronic device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/239,401
Inventor
Tatsuya Gamo
Tatsuya Tanoue
Yoshiaki Kikuchi
Yuko Nakajima
Makoto Nakano
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujitsu Ltd
Original Assignee
Fujitsu Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujitsu Ltd filed Critical Fujitsu Ltd
Assigned to FUJITSU LIMITED reassignment FUJITSU LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GAMO, TATSUYA, KIKUCHI, YOSHIAKI, NAKAJIMA, YUKO, NAKANO, MAKOTO, TANOUE, TATSUYA
Publication of US20060234764A1 publication Critical patent/US20060234764A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • H04M1/724631User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device by limiting the access to the user interface, e.g. locking a touch-screen or a keypad
    • H04M1/724634With partially locked states, e.g. when some telephonic functional locked states or applications remain accessible in the locked states
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • H04M1/724631User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device by limiting the access to the user interface, e.g. locking a touch-screen or a keypad
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2201/00Electronic components, circuits, software, systems or apparatus used in telephone systems
    • H04M2201/34Microprocessors

Definitions

  • the present invention relates to operational restriction control of an electronic device such as mobile terminal devices with multiple functions including phone function, and more specifically, relates to an electronic device in which processing of multiple functions, security features, and operability are integrated harmoniously, and to a method and a program of operational restriction control.
  • the present invention relates to an electronic device in which harmonious integration of concurrent operations of multiple functions, operability, and security features is realized.
  • receiving and answering incoming calls are enabled while operational restriction has been set thereto; using address search function is enabled while having a phone talk; and even while an operational restriction (lock function) has been put on the address search function, the function and other functions will become available by releasing the operational restriction based on certain conditions, without terminating the ongoing phone talk once or losing the lock function.
  • a mobile terminal device equipped with open/close lock function for imposing operational restriction in coordination with open/close mechanism of its case parts.
  • open/close lock function aims at providing temporary operational restriction on multiple functions or on a selected function by the open/close mechanism to be activated simply by folding the case parts when a user leaves the mobile terminal unattended, with the intention of preventing information leakage through peeping of private information such as address book entries stored in the mobile terminal.
  • basic operations such as incoming calls, phone talk, and display should not be restricted in light of usability, and even though after its operational restriction is released selectively, such an inconvenience as its security features are declined should not arise by suppressing (locking) operations of other functions.
  • the present invention relates to an electronic device capable of operating multiple functions simultaneously and capable of setting operational restriction, and its object is to enable operation of another function on which operational restriction has been put even while a particular function is operated, without loss of its security features.
  • Another object of the present invention is, in regard to an electronic device capable of operating multiple functions simultaneously and capable of setting operational restriction, to provide a capability to activate another function on which operational restriction has been put while maintaining a phone talk in the case where incoming calls are arrived and the calls are answered, and to improve usability of operations without loss of its security features.
  • an electronic device capable of operating another function while operating one function and capable of setting operational restriction for each function, the electronic device comprising a control part that accepts said another function calling while operating said one function, and that releases operational restriction based on a judgment of authentication information in the case where the operational restriction has been set to said another function being called.
  • Electronic devices include mobile phones and the like, which are capable of operating multiple functions simultaneously such as reference of phonebook while answering the phone, however, the present invention is not limited to such communication devices as such mobile phones, since an electronic game machine and the like capable of calling another game (another function) while playing one particular game (one function) is conceivable.
  • the present invention can be applied to electronic devices having such multi-task function and operational restriction function.
  • This electronic device accepts another function calling while operating one function. If operational restriction has been set to said another function being called, then it is impossible to activate said another function without removing the operational restriction.
  • Such function calling triggers the prompt of authentication information input.
  • This authentication information includes the authentication information having been registered in the electronic devices such as fingerprints, an identification number, or vein. Users provide such authentication information as required, and through reference of the authentication information, the operational restriction is either released or still imposed. That is, the operation of said another function that has received its function calling becomes possible while one function is operated.
  • control part be configured to output display information prompting to enter the authentication information when it accepts a function calling. According to such a configuration, users can be informed by the output of display information.
  • an operational restriction control method of an electronic device capable of operating another function while operating one function and capable of setting operational restriction for each function, comprising the processing of accepting said another function calling while operating said one function; judging authentication information in the case where operational restriction has been set to said another function being called; and releasing the operational restriction based on the judgment of the authentication information.
  • the processing of accepting said another function calling is performed while operating said one function.
  • input for calling is accepted through the operation of a specific key and the like.
  • authentication information is referenced, and based on the result of its reference, the processing to release the operational restriction is performed. Owing to a series of such processing, as long as the authentication information is incorrect, activation of the function is impossible, so security features would not be lost, and the function being called can be performed after having released the operational restriction that has been put on the function being called.
  • an operational restriction control program of an electronic device capable of operating another function while operating one function and capable of setting operational restriction for each function, the program to be executed by a computer, comprising the steps of accepting said another function calling while operating said one function; judging authentication information in the case where operational restriction has been set to said another function being called; and releasing the operational restriction based on the judgment of the authentication information.
  • an authentication information input part for inputting authentication information may be further provided; the control part may be configured to judge whether or not the entered authentication information matches the registered authentication information; or an operation part used for the function calling may be further provided.
  • the processing of outputting display information prompting for input of authentication information used as a reference for releasing the operational restriction may be further provided.
  • the step of outputting display information prompting for input of authentication information used as a reference for releasing the operational restriction may be further provided.
  • FIG. 1 is a block diagram showing a mobile terminal device according to a first embodiment
  • FIG. 2 is a diagram showing a mobile terminal device in an opened state
  • FIG. 3 is a diagram showing a mobile terminal device in a closed state
  • FIG. 4 is a flowchart showing the operation of function calling during incoming calls while open/close lock has been set
  • FIG. 5 is a flowchart showing the operation of function calling during incoming calls while open/close lock has been set
  • FIGS. 6A, 6B , 6 C, and 6 D are diagrams showing incoming call screen, phone talk screen, and authentication screen and the like.
  • FIG. 7A is a diagram showing open/close lock release screen, and 7 B is-a diagram showing menu screen;
  • FIG. 8 is a flowchart showing the operation of function calling while open/close clock has-been set
  • FIG. 9 is a flowchart showing the operation of another function calling while one function is operated.
  • FIG. 10 is a block diagram showing a mobile terminal device according to a second embodiment
  • FIG. 11 is a diagram showing a mobile terminal device
  • FIG. 12 is a diagram showing a mobile terminal device without a fingerprint sensor
  • FIG. 13 is a diagram showing a PC
  • FIG. 14 is a diagram showing a PDA
  • FIG. 15 is a diagram showing a camera
  • FIG. 1 is a block diagram showing a mobile terminal device according to a first embodiment.
  • This mobile terminal device 2 is one example of electronic devices that comprise a plurality of functions including phone call function, and the mobile terminal device 2 of this embodiment includes open/close lock function interlocked with an open/close mechanism to be described later ( FIG. 2 ).
  • the open/close lock function is a function for putting operational restriction on all or some of the functions that the mobile terminal device 2 provides; and for establishing a locked-up state automatically by synchronizing the timing to put the operational restriction with the open/close mechanism. That is, a locked-up state is established by changing the device from an opened state to a closed state.
  • This mobile terminal device 2 includes a memory part 4 , a processor 6 , a wireless transmission/reception part 8 , an open/close sensor 10 , an input operation part 12 , a fingerprint sensor 14 , a display part 16 , a microphone 18 , a speaker 20 and others.
  • the memory part 4 represents record medium such as a ROM (Read-Only Memory), a RAM (Random-Access Memory) as a whole, and may be comprised of removable record medium.
  • a program storage part 42 In this memory part 4 , a program storage part 42 , a data storage part 44 , and others are defined; and in this program storage part 42 , a management program 422 , a screen display program 424 , an authentication program 426 , a lock/release program 428 , and other various types of information processing programs are stored.
  • the management program 422 constitutes a framework and manages storage and deletion of data such as address book, phonebook, notepad; execution and stop of the screen display program 424 , the authentication program 426 , the lock set/release program 428 , and other various types of information processing programs.
  • the lock set/release program 428 executes lock setting (operational restriction) and its release (release of restriction) to each function. In this case, for the operational restriction, various types of modes such as all-lock mode, secret mode, and falsification-proof mode are provided in order to meet the demand for security features.
  • All-lock mode puts operational restriction on all the functions; secret mode puts operational restriction on display function of phonebook data and schedule data; and falsification-proof mode puts operational restriction on display and edit functions of data such as phonebook, profile, and schedule.
  • This mobile terminal device 2 is configured such that even if operational restrictions have been put on any of the functions, incoming call function and phone talk function are free from such operational restrictions. Further, in order to release operational restrictions that have been put on the functions, authentication information is referenced and for this authentication information, previously registered information by users such as fingerprints, a PIN number, and vein information are used.
  • an address book area 442 In the data storage part 44 , an address book area 442 , a phonebook area 444 , a notepad area 446 , and authentication information area 448 , and others are defined and relevant data is stored respectively. That is, address data such as contacts is stored in the address book area 442 ; phone numbers for making a call and email addresses for sending/receiving emails are stored in the phonebook area 444 ; memos written by users as needed are stored in the notepad area 446 , and these information belong to private information of users.
  • the authentication information area 448 various types of authentication information such as fingerprints, a PIN number, vein information and the like are registered.
  • the processor 6 constitutes the control part, the operational restriction setting judgment part, the authentication information request part, the information processing part and the like.
  • the processor 6 is comprised of a CPU (Central Processing Unit) or the like, and provided with the memory part for storing data in the process of computing.
  • This processor 6 executes various types of programs such as the above-described management program 422 , and performs various settings and controls such as phone call function, open/close lock function, its release function, operational restriction setting judgment function, authentication information request function, screen display function, input/output of various data function, address book or phonebook searching function, notepad writing function, or its delete function.
  • the control part provides functions to accept another function calling while operating one function and to release operational restriction based on the judgment of authentication information in the case where the operational restriction has been set to the function being called. More specifically, the control part provides such a function that accepts incoming calls in the case where operational restriction has been set; accepts another function calling during a phone talk; and releases the operational restriction based on authentication information, in the case where the operational restriction has been set to the function being called.
  • the function as the operational restriction setting judgment part the processor 6 possesses is a function to judge whether or not operational restriction has been set to another function being called in the case where said another function is called while operating one function.
  • the function as the authentication information request part is a function to make a request to the user for authentication information for releasing the operational restriction in the case where the operational restriction setting judgment part judges that the operational restriction has been set to said another function.
  • the function as the control part that is linked with these functions is a function to make a judgment by comparing the authentication information requested from the authentication information request part with the authentication information entered by the user, and that releases the operational restriction based on the judgment result.
  • the wireless transmission/reception part 8 performs transmission/reception over wireless signals to and from base stations (not shown) via an antenna 22 .
  • This wireless transmission/reception part 8 includes a modem circuit for performing modulation/demodulation as signal processing, and a baseband circuit for performing encryption/decryption and the like.
  • the open/close sensor 10 is disposed when the open/close mechanism 24 is provided for the mobile terminal device 2 , and detects electrically that the open/close mechanism 24 is brought into an opened state or a closed state.
  • the input operation part 12 is used for entering phone numbers, characters, and PIN numbers as a personal identification number; for activating a function; and for operating its release and the like.
  • the input operation part 12 includes a task key 122 , a decision key 124 , dial and character keys 126 , a start and character key 128 , a power/end key 129 , and others.
  • the input operation part 12 constitutes the authentication information input part.
  • the task key 122 comprises an operation part used for function calling, and used for entering instructions such as activation of functions.
  • the decision key 124 is used for entering a confirmation of instructions for the information or the function displayed on the display part 16 when the function is activated.
  • Dial and character keys 126 are used for dial input, character input, PIN number input as authentication information and others.
  • the start and character key 128 is used for starting a phone call.
  • the power/end key 129 is used for turning the power on and terminating phone calls.
  • the fingerprint sensor 14 comprises the authentication information input part, and in this embodiment, detects the fingerprints of users that are one of the authentication information.
  • the fingerprint sensor 14 may be skipped when fingerprints are not used as authentication information.
  • the display part 16 consists of an LCD (Liquid Crystal Display), for example, and displays images such as characters, graphics, and pictures; status indication while one function is operated; and in the case where another function calling is performed while one function is operated, displays information about the function calling or its status indication in progress.
  • LCD Liquid Crystal Display
  • the microphone 18 converts voice input into electrical signals
  • the speaker 20 converts the electrical signals into voice.
  • the microphone 18 and the speaker 20 are used in both outgoing call mode and incoming call mode; however, in all-lock mode, operational restriction is set thereto.
  • the mobile terminal device 2 configured as such can operate multiple functions simultaneously as well as put operational restriction selectively on each function depending on its security features. Further, it can accept another function calling while operating one function; accept input of authentication information if operational restriction has been set to said another function; compare the entered authentication information with the registered authentication information; and operate said another function while operating said one function if the entered authentication information is correct. For example, if a situation arises in which phonebook needs to be referenced during incoming calls in the case where operational restriction has been set to the phonebook and receiving incoming calls has been made possible, pressing the task key 122 switches to authentication mode and reference-of the phonebook is allowed if the authentication information is found as identical. In this way, another function can be operated while one function is operated based on the condition that the authentication information is identical, and this can save the operation to switch to another function after having terminated one function, maintain security features, and consequently provide the mobile terminal device 2 of higher convenience.
  • FIG. 2 is a front view of the mobile terminal device 2 in an opened state
  • FIG. 3 is a side view in a closed state.
  • the same symbols are assigned to parts identical to those of FIG. 1 .
  • This mobile terminal device 2 includes a first and a second case part 26 , 28 respectively, and these case parts 26 , 28 are connected to be openable/closable via the open/close mechanism 24 .
  • the open/close sensor 10 is disposed on the case parts 26 , 28 that are opened by the open/close mechanism 24 , and a detection signal for representing an opened or closed state of the case parts 26 , 28 is obtained from this open/close sensor 10 .
  • a locked-up state operational restriction state
  • various keys 122 to 129 of the input operation part 12 , the fingerprint sensor 14 , the microphone 18 and others are disposed along with the built-in memory part 4 , the processor 6 and others.
  • the display part 16 and the speaker 20 are disposed along with the built-in antenna 22 .
  • the above-described operations such as calling another function during a phone talk, authentication operation of its authentication information, and operation of said another function can be performed without any alterations to the key arrangement of the existing input operation part 12 .
  • FIG. 4 is a flowchart showing the operation of incoming calls and function calling while the open/close lock has been set. This processing is performed when the case parts 26 , 28 are folded.
  • this terminal device 2 the operation of incoming calls and phone talk is possible even if operational restriction has been set to its various types of functions. This is a situation in which the power has been turned on; an incoming call is received while operational restriction has been set; and a ring alert occurs (step Si) while the case parts 26 , 28 have been folded ( FIG. 3 ).
  • a standby screen is activated and displayed on the display part 16 (step S 2 ).
  • the user starts a phone talk (step S 3 ), and a screen showing that the phone talk is in progress is displayed (step S 4 ). That is, the user can recognize that the phone talk is still in progress.
  • step S 5 pressing the task key 122 (step S 5 ) as a specific key of the input operation part 12 starts another function calling other than the phone talk function.
  • this authentication processing it is judged whether or not the entered authentication information is identical to the previously registered authentication information by using the previously registered authentication information as a reference. If identical, then the authentication completes; the operational restriction is released; the function is activated (step S 10 ); and the screen showing its operation is displayed (step S 11 ). If the operational restriction has not been set, the procedure moves from step S 6 to step S 10 .
  • step S 12 The user can operate this function during phone talk, and when the user finishes operating this function (step S 12 ), a judgment is made whether or not the phone talk is over (step S 13 ). If the phone talk is still taking place, then the procedure moves to step S 4 to display the screen showing that the phone talk is in progress; and then returns to the standby screen of step S 2 when the phone talk is over.
  • the user can receive incoming calls with the mobile terminal device 2 in an opened state ( FIG. 3 ) and, for example, can refer to the phonebook during the phone talk.
  • the locked state can be recovered by returning the mobile terminal device 2 to a closed state ( FIG. 3 ) from an opened state ( FIG. 2 ).
  • FIG. 5 is a flowchart showing the operation of incoming calls and function calling while the open/close lock has been set.
  • step S 21 the standby screen is displayed on the display part 16 .
  • step S 22 the user starts a phone talk (step S 23 ); and a screen showing that the phone talk is in progress is displayed (step S 24 ). It has been already described that the user can recognize that the phone talk function is still in progress.
  • step S 25 pressing the task key 122 (step S 25 ) as a specific key of the input operation part 12 starts another function calling other than the phone talk function as described above.
  • step S 30 the operational restriction is released; the function is activated (step S 30 ) and the screen showing its operation is displayed (step S 31 ) If the operational restriction has not been set, the procedure moves from step S 26 to step S 30 .
  • step S 32 The user can operate this function during phone talk, and when the user finishes operating this function (step S 32 ), a judgment is made whether or not the phone talk is over (step S 33 ). If the phone talk is still taking place, then the procedure moves to step S 24 to wait for the specific key to be pressed; and returns to the standby screen of step S 21 when the phone talk is over.
  • This processing is performed when the user receives an incoming call with the standby screen activated ( FIG. 2 ), and can activate another function by releasing its operational restriction during the phone talk.
  • the locked-up state can be recovered by returning the mobile terminal device 2 to a closed state ( FIG. 3 ).
  • FIGS. 6A, 6B , 6 C, 6 D, 7 A, and 7 B are diagrams showing screens of an incoming call while the open/close lock has been set, another function calling, and authentication information input and the like
  • FIG. 7A is a diagram showing a screen that the open/close lock is released
  • 7 B is a diagram showing a menu screen after the open/close lock has been released.
  • a screen 50 for indicating the incoming call is displayed on the display part 16 as shown in FIG. 6A .
  • a screen 54 for indicating that the phone talk is in progress is displayed on the display part 16 as shown in FIG. 6B .
  • a message “phone talk is in progress” and the phone number of the caller are displayed.
  • This screen 54 may also display the name of the caller and other information.
  • pressing the task key 122 ( FIG. 2 ) shown in FIG. 6C brings up an input screen 56 for entering authentication information as shown in FIG. 6D .
  • a text indicating that “fingerprint authentication” is selected; and an image 58 for instructing how to use the fingerprint authentication method as well as a message “Enter your fingerprint or PIN number” is displayed as a guide message 60 for prompting input of authentication information.
  • a screen 62 for indicating a release of the open/close lock is displayed on the display part 16 as shown in FIG. 7A .
  • “Open/close lock has been released” is displayed as a message 64 for indicating the current state.
  • a menu selection screen 66 for indicating a menu of functions from which the operational restriction has been released is displayed on the display part 16 as shown in FIG. 7B .
  • various types of functions different from the phone talk function are displayed as selectable menu. For example, such functions as “Multi-access, Mail, Phonebook, List of applications...” are displayed. “Multi-access” indicates that activation and operation of another function that is selected is available while operating one function, for example, while operating the phone talk function. In this situation, for example, putting a cursor 68 on the “phonebook” and pressing the decision key 124 unfolds the phonebook data on the display part 16 .
  • the user can reference the phonebook during the phone talk. If the user selects a different function, then that function is operated.
  • the screen 54 indicating that the phone talk is in progress is displayed as shown in FIG. 6B , and the standby screen is brought back when the user finishes the phone talk.
  • FIG. 8 is a flowchart showing the operation of function calling while the open/close lock has been set.
  • step S 41 When the case parts 26 , 28 are opened, the standby screen is displayed on the display part 16 (step S 41 ). On this standby screen, the lock icon 52 for indicating the open/close lock has been set is displayed if the lock is applied. In this standby state, when the user operates function calling, the function calling is accepted (step S 42 ), followed by a judgment that the open/close lock has been set or not (step S 43 ).
  • step S 44 the authentication screen is displayed on the display part 16 (step S 44 ); and the user is prompted with input of authentication information.
  • step S 45 a judgment is made whether or not the entered authentication information is correct. If the entered authentication information is identical to the previously registered authentication information, then the open/close lock is released and the selected function is activated (step S 47 ); and the screen showing its operation is displayed (step S 48 ). If the operational restriction has not been set, the procedure moves from step S 43 to step S 47 . If the authentication information is judged as incorrect in step S 46 , then the standby screen in step S 41 is brought back. After the authentication processing has completed successfully and the function has been activated, a judgment is made whether or not the function is finished (step S 49 ), and the standby screen is brought back after the completion of the function (step S 41 ).
  • a certain function can be called from the standby screen, and when the lock has been set to the function, the function can be activated and operated through its authentication processing.
  • the mobile terminal device 2 can be put into a locked-up state by folding it to a closed state ( FIG. 3 ).
  • FIG. 9 is a flowchart showing the operation of another function calling while one function is operated.
  • Steps S 51 to S 58 show the operation of one function
  • steps S 60 to S 66 show the operation of another function while operating said one function.
  • operational restriction may have been set to any of the functions in steps S 60 to S 66 . This is a situation in which the operation of another function calling is accepted while operating one function and in which operational restriction is released from said another function in the case if any operational restrictions have been put thereon.
  • the standby screen is displayed on the display part 16 of the mobile terminal device 2 in a standby state (step S 51 ).
  • a standby state With this state, when the user executes one function calling (step S 52 ), then a judgment is made whether it has been locked or not (step S 53 ); if it has been locked, then the authentication screen is displayed on the display part 16 (step S 54 ); and the user is prompted with input of authentication information.
  • step S 51 If the authentication information is judged as incorrect in step S 56 , then the standby screen in step S 51 is brought back.
  • the management program 422 monitors whether or not the ongoing function is finished (step S 59 ), and brings back the standby screen at the end of the function (step S 51 ).
  • step S 60 if another function calling occurs while operating one function (step S 60 ), then a judgment is made whether or not the function has been locked (step S 61 ). If the function has been locked, then authentication screen is displayed on the display part 16 (step S 62 ); and the user is prompted with input of authentication information. When the user enters the authentication information by following the guide (step S 63 ); then a judgment is made whether or not the entered authentication information is correct (step S 64 ). If the entered authentication information is identical to the previously registered authentication information, then the lock is released and said another function is activated (step S 65 ); and the screen showing its operation is displayed (step S 66 ). If said another function has not been locked in step S 61 , the procedure shifts from step S 61 to step S 65 to activate said another function.
  • step S 64 If the authentication information is judged as incorrect in step S 64 , then the screen showing the operation of the ongoing function in step 58 is displayed.
  • the management program 422 monitors whether or not said another function is finished (step S 67 ), and shifts to the screen showing the ongoing operation at the end of said another function (step S 58 ), making it ready for calling other functions.
  • another function can be called while the operation of one function continues, and if the lock function has been applied to said another function being called, that is, if operational restriction has been put thereon, then said another function can be activated and operated through input of its authentication information and judgment of its correctness. Since the activation of this latter function is realized by an interrupt-service in the middle of processing the former function, so when the latter function finishes, the procedure returns to the previous function to continue its operation. Furthermore in this embodiment, by putting the mobile terminal device 2 back into a closed state ( FIG. 3 ), the lock function can be applied again.
  • the electronic devices such as the mobile terminal device 2 comprising such features can operate multiple functions simultaneously with no decline in security features and operability.
  • FIG. 10 is a block diagram of a mobile terminal device 2 according to a second embodiment.
  • FIG. 11 is a diagram showing a specific configuration example of the mobile terminal device.
  • the same symbols are assigned to parts identical to those of FIGS. 1, 2 .
  • the mobile terminal device 2 of this embodiment includes a lock key 123 in place of the open/close sensor 10 ( FIG. 1 ). According to this configuration, pressing the lock key 123 activates the lock function and puts operational restriction. That is, this lock key 123 executes the activation of the lock function in the lock set/release program 428 stored in the program storage part 42 .
  • Other configurations are the same as those of the mobile terminal device 2 of the first embodiment.
  • Such a mobile terminal device 2 is not equipped with the open/close mechanism 24 ( FIG. 1 ), and comprised of a single case part 27 .
  • the lock key 123 is disposed on this case part 27 .
  • the input operation part 12 and the display part 16 and others that are disposed separately on the case parts 26 , 28 are arranged on the single case part 27 .
  • Each configuration is the same as those of the mobile terminal device 2 of the first embodiment ( FIG. 2 ).
  • FIGS. 4, 5 screen displays shown in FIGS. 6A to 7 B, and operations shown in FIGS. 8, 9 can be performed. That is, while operational restriction has been set by operating the lock key 123 , the processing such as accepting incoming calls and activating one function; calling another function during the incoming calls or while operating said one function; and activating and operating said another function through its authentication processing is enabled, so that there is an advantage that complicated key operations are not required.
  • the mobile terminal device 2 comprising the fingerprint sensor 14 ( FIGS. 1, 2 ) was exemplified.
  • the mobile terminal device 2 can be configured without the fingerprint sensor 14 , by enabling the release of operational restriction through a secret number such as a PIN number.
  • the mobile terminal device 2 was exemplified as an electronic device; however, as shown in FIG. 13 , the present invention can also be applied to a PC (personal computer) 70 .
  • a PC personal computer
  • FIGS. 13 the same symbols are assigned to parts identical to those of FIGS. 1, 2 .
  • This PC 70 is constructed such that the case part 26 and the case part 28 are disposed to be openable/closeable via the open/close mechanism 24 , and on the case part 26 , the above-described open/close sensor 10 is disposed. That is, it is also possible to configure the PC 70 to activate its lock mechanism by detecting an open/close state.
  • disposing the task key 122 as a specific key provides, as described above, the capability of calling another function on which operational restriction has been put while one function is operated; enables to activate and then operate said another function after its authentication processing is completed; and can enhance security features for the PC 70 as well.
  • the present invention can also be applied to a PDA (Personal Digital Assistant) 72 shown in FIG. 14 .
  • the PDA can be configured to include the lock function along with the lock key 123 .
  • Such a configuration provides, as described above, the capability of calling another function on which operational restriction has been put while one function is operated; enables to activate and then operate said another function after its authentication processing is completed; and can enhance security features for the PDA 72 as well.
  • the present invention can also be applied to a camera 74 shown in FIG. 15 .
  • the camera can be configured to include the lock function along with the lock key 123 .
  • Such a configuration provides, as described above, the capability of calling another function, for example, edit function on which operational restriction has been put that becomes effective while one function such as photo shooting mode is operated; enables to activate and then operate the edit function after its authentication processing is completed.
  • the camera 74 can be also provided with enhanced security features against deletion or falsification of its photographed data.
  • the present invention can be applied to such as a game machine as well. For example, by enabling the game machine to call another game function on which operational restriction has been put while one game function is operated; and to activate and then operate said another game function after its authentication processing is completed, the game machine can be provided with enhanced security features against deletion or falsification of information set to the game.
  • the mobile terminal device 2 the PC 70 , the PDA 72 , the camera 74 , and the game machine were exemplified as electronic devices.
  • the present invention can also be applied to various types of electronic devices capable of operating multiple functions simultaneously and capable of setting operational restriction for the functions, other than the above-described ones.
  • the mobile terminal device 2 that has been locked by the open/close lock mechanism could start a phone talk when it receives incoming calls, and could operate another function such as address book reference during a phone talk.
  • the mobile terminal device 2 that is playing a game can start a phone talk immediately after it receives incoming calls, or can start a phone talk after it requests authentication information followed by a verification of correctness of the provided authentication information.
  • the open/close lock function that was interlocked with the open/close mechanism 24 (first embodiment), and the lock function activated by operating the lock key 123 (second embodiment) were exemplified.
  • the electronic devices such as the mobile terminal device 2 operateing multiple functions simultaneously, it is also possible to configure the devices in such a way that the lock function can be activated not only by the open/close mechanism 24 and the lock key 123 , but also by detecting the absence of operations by the user for a certain time period.
  • the present invention relates to an electronic device capable of operating multiple functions simultaneously and capable of setting operational restriction, and is useful such that it enables to operate another function through authentication information matching; to realize simultaneous operation of multiple functions without degrading usability and security; and to increase level of convenience for electronic devices.

Abstract

The present invention relates to an electronic device capable of operating multiple functions simultaneously, and enables to operate another function on which operational restriction has been put, with no decline in security features, even while operating a particular function. The electronic device is an electronic device (e.g., mobile terminal device 2) capable of operating another function while operating one function and capable of setting operational restriction for each function, comprising a control part (processor 6) that accepts said another function calling while operating said one function, and that releases the operational restriction based on the judgment of the authentication information in the case where the operational restriction has been set to said another function being called.

Description

    CROSS-REFERENCE RELATED APPLICATION
  • This application is based upon and claims the benefit of priority from the prior Japanese Patent Application No. 2005-119890, filed on Apr. 18, 2005, the entire contents of which are incorporated herein by reference.
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention relates to operational restriction control of an electronic device such as mobile terminal devices with multiple functions including phone function, and more specifically, relates to an electronic device in which processing of multiple functions, security features, and operability are integrated harmoniously, and to a method and a program of operational restriction control.
  • The present invention relates to an electronic device in which harmonious integration of concurrent operations of multiple functions, operability, and security features is realized. For example, in a mobile terminal device as one example of such electronic devices, receiving and answering incoming calls are enabled while operational restriction has been set thereto; using address search function is enabled while having a phone talk; and even while an operational restriction (lock function) has been put on the address search function, the function and other functions will become available by releasing the operational restriction based on certain conditions, without terminating the ongoing phone talk once or losing the lock function.
  • 2. Description of the Related Art
  • As an example of electronic devices, there is a mobile terminal device equipped with open/close lock function for imposing operational restriction in coordination with open/close mechanism of its case parts. Such open/close lock function aims at providing temporary operational restriction on multiple functions or on a selected function by the open/close mechanism to be activated simply by folding the case parts when a user leaves the mobile terminal unattended, with the intention of preventing information leakage through peeping of private information such as address book entries stored in the mobile terminal. As it is such a casual lock function that basic operations such as incoming calls, phone talk, and display should not be restricted in light of usability, and even though after its operational restriction is released selectively, such an inconvenience as its security features are declined should not arise by suppressing (locking) operations of other functions.
  • Among conventional technologies related to such selective release of operational restriction on mobile phones and the like, there is one that switches to a phone talk state by the operation of a specific key when incoming calls are received in a standby state (e.g., Japanese Patent Application Laid-Open Publication No. H09(1997)-261336 (Paragraph No. 0048, FIG. 5, etc.) ) ; one that selects setting information according to the contents of incoming calls and messages received during key lock (e.g., Japanese Patent Application Laid-Open Publication No. 2004-328573 (Paragraph Nos. 0021, 0022, FIG. 2, etc.)).
  • Owing to such partial release of operational restriction, users can handle incoming calls without releasing the open/close lock. However, if the users cannot release the lock during incoming calls or a phone talk, they find it impossible to operate another function such as reference of address book during incoming calls. If such a need arises, then a troublesome operation such as the following is required.
      • 1. Terminate the phone call (finish the talk).
      • 2. Release the lock.
      • 3. Call back.
        This is significantly inconvenient, and because of such inconvenience, lock mechanisms are hard to be utilized, leaving room for further improvement.
  • The technologies disclosed in Japanese Patent Application Laid-Open Publication Nos. H09(1997)-261336 and 2004-328573 describe that answering the phone is possible even with the locked key, however, multiple key operations are required in order to switch to a phone talk state while receiving incoming calls, so there is a problem that key operations become cumbersome.
  • Such issues are also common to an electronic device comprising multiple functions, capable of operating another function while operating one function and capable of setting operational restriction to said another function. None of Japanese Patent Application Laid-Open Publication Nos. H09 (1997)-261336, 2004-328573 discloses such issues at all, nor discloses or suggests any solutions for the issues.
  • SUMMARY OF THE INVENTION
  • The present invention relates to an electronic device capable of operating multiple functions simultaneously and capable of setting operational restriction, and its object is to enable operation of another function on which operational restriction has been put even while a particular function is operated, without loss of its security features.
  • Another object of the present invention is, in regard to an electronic device capable of operating multiple functions simultaneously and capable of setting operational restriction, to provide a capability to activate another function on which operational restriction has been put while maintaining a phone talk in the case where incoming calls are arrived and the calls are answered, and to improve usability of operations without loss of its security features.
  • Each aspect of the configurations of the present invention in which the above-described issues have been solved will be listed and explained hereinafter.
  • According to a first aspect of the present invention there is provided an electronic device capable of operating another function while operating one function and capable of setting operational restriction for each function, the electronic device comprising a control part that accepts said another function calling while operating said one function, and that releases operational restriction based on a judgment of authentication information in the case where the operational restriction has been set to said another function being called.
  • Electronic devices according to the present invention include mobile phones and the like, which are capable of operating multiple functions simultaneously such as reference of phonebook while answering the phone, however, the present invention is not limited to such communication devices as such mobile phones, since an electronic game machine and the like capable of calling another game (another function) while playing one particular game (one function) is conceivable. The present invention can be applied to electronic devices having such multi-task function and operational restriction function.
  • This electronic device accepts another function calling while operating one function. If operational restriction has been set to said another function being called, then it is impossible to activate said another function without removing the operational restriction. Such function calling triggers the prompt of authentication information input. This authentication information includes the authentication information having been registered in the electronic devices such as fingerprints, an identification number, or vein. Users provide such authentication information as required, and through reference of the authentication information, the operational restriction is either released or still imposed. That is, the operation of said another function that has received its function calling becomes possible while one function is operated. Since activation of said another function is impossible as long as the authentication information is incorrect, security features would not be lost; and there is no need to terminate said one ongoing function once in order to operate said another function being called and to activate said one function again at the end of operating said another function being called.
  • It is preferable that, in the above-described electronic device, the control part be configured to output display information prompting to enter the authentication information when it accepts a function calling. According to such a configuration, users can be informed by the output of display information.
  • According to a second aspect of the present invention there is provided an operational restriction control method of an electronic device capable of operating another function while operating one function and capable of setting operational restriction for each function, comprising the processing of accepting said another function calling while operating said one function; judging authentication information in the case where operational restriction has been set to said another function being called; and releasing the operational restriction based on the judgment of the authentication information.
  • According to this configuration, in order to operate another function while operating one function, the processing of accepting said another function calling is performed while operating said one function. In this processing, input for calling is accepted through the operation of a specific key and the like. At the time of accepting this function calling, if operational restriction has been set to said another function being called, then authentication information is referenced, and based on the result of its reference, the processing to release the operational restriction is performed. Owing to a series of such processing, as long as the authentication information is incorrect, activation of the function is impossible, so security features would not be lost, and the function being called can be performed after having released the operational restriction that has been put on the function being called.
  • According to a third aspect of the present invention there is provided an operational restriction control program of an electronic device capable of operating another function while operating one function and capable of setting operational restriction for each function, the program to be executed by a computer, comprising the steps of accepting said another function calling while operating said one function; judging authentication information in the case where operational restriction has been set to said another function being called; and releasing the operational restriction based on the judgment of the authentication information.
  • According to this configuration, through the linked steps of accepting another function calling while operating one function and of releasing operational restriction by referencing its authentication information in the case where the operational restriction has been set to said another function being called, activation of said another function is made possible only when the authentication information is correct, so that security features would not be lost and said another function being called can be executed by the computer without the need for terminating the ongoing function once.
  • To solve the above-described issues, in the previously described electronic device, an authentication information input part for inputting authentication information may be further provided; the control part may be configured to judge whether or not the entered authentication information matches the registered authentication information; or an operation part used for the function calling may be further provided.
  • To solve the above-described issues, in the operational restriction control method of the previously described electronic device, the processing of outputting display information prompting for input of authentication information used as a reference for releasing the operational restriction may be further provided.
  • To solve the above-described issues, in the previously described operational restriction control program of the electronic device, the step of outputting display information prompting for input of authentication information used as a reference for releasing the operational restriction may be further provided.
  • Features and advantages of the present invention will be listed hereinbelow.
  • (1) It makes possible for an electronic device capable of operating multiple functions simultaneously and capable of putting operational restriction on its functions to call and execute another function easily on which operational restriction has been put while one function is operated, without degradation of security features.
  • (2) It makes possible for an electronic device such as mobile terminal devices capable of receiving incoming calls and having a phone talk to call and execute another function on which operational restriction has been put while having a phone talk, without degradation of security features and without inconvenience of terminating the phone talk.
  • The above and other objects, features and advantages of the present invention will become more apparent from the following detailed description when taken in conjunction with the accompanying drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram showing a mobile terminal device according to a first embodiment;
  • FIG. 2 is a diagram showing a mobile terminal device in an opened state;
  • FIG. 3 is a diagram showing a mobile terminal device in a closed state;
  • FIG. 4 is a flowchart showing the operation of function calling during incoming calls while open/close lock has been set;
  • FIG. 5 is a flowchart showing the operation of function calling during incoming calls while open/close lock has been set;
  • FIGS. 6A, 6B, 6C, and 6D are diagrams showing incoming call screen, phone talk screen, and authentication screen and the like.
  • FIG. 7A is a diagram showing open/close lock release screen, and 7B is-a diagram showing menu screen;
  • FIG. 8 is a flowchart showing the operation of function calling while open/close clock has-been set;
  • FIG. 9 is a flowchart showing the operation of another function calling while one function is operated;
  • FIG. 10 is a block diagram showing a mobile terminal device according to a second embodiment;
  • FIG. 11 is a diagram showing a mobile terminal device;
  • FIG. 12 is a diagram showing a mobile terminal device without a fingerprint sensor;
  • FIG. 13 is a diagram showing a PC;
  • FIG. 14 is a diagram showing a PDA;
  • FIG. 15 is a diagram showing a camera;
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS First Embodiment
  • A first embodiment of the present invention will be described with reference to FIG. 1. FIG. 1 is a block diagram showing a mobile terminal device according to a first embodiment.
  • This mobile terminal device 2 is one example of electronic devices that comprise a plurality of functions including phone call function, and the mobile terminal device 2 of this embodiment includes open/close lock function interlocked with an open/close mechanism to be described later (FIG. 2). The open/close lock function is a function for putting operational restriction on all or some of the functions that the mobile terminal device 2 provides; and for establishing a locked-up state automatically by synchronizing the timing to put the operational restriction with the open/close mechanism. That is, a locked-up state is established by changing the device from an opened state to a closed state.
  • This mobile terminal device 2 includes a memory part 4, a processor 6, a wireless transmission/reception part 8, an open/close sensor 10, an input operation part 12, a fingerprint sensor 14, a display part 16, a microphone 18, a speaker 20 and others. The memory part 4 represents record medium such as a ROM (Read-Only Memory), a RAM (Random-Access Memory) as a whole, and may be comprised of removable record medium. In this memory part 4, a program storage part 42, a data storage part 44, and others are defined; and in this program storage part 42, a management program 422, a screen display program 424, an authentication program 426, a lock/release program 428, and other various types of information processing programs are stored.
  • The management program 422 constitutes a framework and manages storage and deletion of data such as address book, phonebook, notepad; execution and stop of the screen display program 424, the authentication program 426, the lock set/release program 428, and other various types of information processing programs. The lock set/release program 428 executes lock setting (operational restriction) and its release (release of restriction) to each function. In this case, for the operational restriction, various types of modes such as all-lock mode, secret mode, and falsification-proof mode are provided in order to meet the demand for security features. All-lock mode puts operational restriction on all the functions; secret mode puts operational restriction on display function of phonebook data and schedule data; and falsification-proof mode puts operational restriction on display and edit functions of data such as phonebook, profile, and schedule. This mobile terminal device 2 is configured such that even if operational restrictions have been put on any of the functions, incoming call function and phone talk function are free from such operational restrictions. Further, in order to release operational restrictions that have been put on the functions, authentication information is referenced and for this authentication information, previously registered information by users such as fingerprints, a PIN number, and vein information are used.
  • In the data storage part 44, an address book area 442, a phonebook area 444, a notepad area 446, and authentication information area 448, and others are defined and relevant data is stored respectively. That is, address data such as contacts is stored in the address book area 442; phone numbers for making a call and email addresses for sending/receiving emails are stored in the phonebook area 444; memos written by users as needed are stored in the notepad area 446, and these information belong to private information of users. In the authentication information area 448, various types of authentication information such as fingerprints, a PIN number, vein information and the like are registered.
  • The processor 6 constitutes the control part, the operational restriction setting judgment part, the authentication information request part, the information processing part and the like. The processor 6 is comprised of a CPU (Central Processing Unit) or the like, and provided with the memory part for storing data in the process of computing. This processor 6 executes various types of programs such as the above-described management program 422, and performs various settings and controls such as phone call function, open/close lock function, its release function, operational restriction setting judgment function, authentication information request function, screen display function, input/output of various data function, address book or phonebook searching function, notepad writing function, or its delete function. That is, among various types of functions of the processor 6, the control part provides functions to accept another function calling while operating one function and to release operational restriction based on the judgment of authentication information in the case where the operational restriction has been set to the function being called. More specifically, the control part provides such a function that accepts incoming calls in the case where operational restriction has been set; accepts another function calling during a phone talk; and releases the operational restriction based on authentication information, in the case where the operational restriction has been set to the function being called.
  • Further, the function as the operational restriction setting judgment part the processor 6 possesses is a function to judge whether or not operational restriction has been set to another function being called in the case where said another function is called while operating one function. Furthermore, the function as the authentication information request part is a function to make a request to the user for authentication information for releasing the operational restriction in the case where the operational restriction setting judgment part judges that the operational restriction has been set to said another function. Moreover, the function as the control part that is linked with these functions is a function to make a judgment by comparing the authentication information requested from the authentication information request part with the authentication information entered by the user, and that releases the operational restriction based on the judgment result.
  • The wireless transmission/reception part 8 performs transmission/reception over wireless signals to and from base stations (not shown) via an antenna 22. This wireless transmission/reception part 8 includes a modem circuit for performing modulation/demodulation as signal processing, and a baseband circuit for performing encryption/decryption and the like.
  • The open/close sensor 10 is disposed when the open/close mechanism 24 is provided for the mobile terminal device 2, and detects electrically that the open/close mechanism 24 is brought into an opened state or a closed state.
  • The input operation part 12 is used for entering phone numbers, characters, and PIN numbers as a personal identification number; for activating a function; and for operating its release and the like. The input operation part 12 includes a task key 122, a decision key 124, dial and character keys 126, a start and character key 128, a power/end key 129, and others. When a PIN number or the like is used as authentication information, the input operation part 12 constitutes the authentication information input part.
  • In this input operation part 12, the task key 122 comprises an operation part used for function calling, and used for entering instructions such as activation of functions. The decision key 124 is used for entering a confirmation of instructions for the information or the function displayed on the display part 16 when the function is activated. Dial and character keys 126 are used for dial input, character input, PIN number input as authentication information and others. The start and character key 128 is used for starting a phone call. The power/end key 129 is used for turning the power on and terminating phone calls.
  • The fingerprint sensor 14 comprises the authentication information input part, and in this embodiment, detects the fingerprints of users that are one of the authentication information. The fingerprint sensor 14 may be skipped when fingerprints are not used as authentication information.
  • The display part 16 consists of an LCD (Liquid Crystal Display), for example, and displays images such as characters, graphics, and pictures; status indication while one function is operated; and in the case where another function calling is performed while one function is operated, displays information about the function calling or its status indication in progress.
  • The microphone 18 converts voice input into electrical signals, and the speaker 20 converts the electrical signals into voice. The microphone 18 and the speaker 20 are used in both outgoing call mode and incoming call mode; however, in all-lock mode, operational restriction is set thereto.
  • According to the mobile terminal device 2 configured as such can operate multiple functions simultaneously as well as put operational restriction selectively on each function depending on its security features. Further, it can accept another function calling while operating one function; accept input of authentication information if operational restriction has been set to said another function; compare the entered authentication information with the registered authentication information; and operate said another function while operating said one function if the entered authentication information is correct. For example, if a situation arises in which phonebook needs to be referenced during incoming calls in the case where operational restriction has been set to the phonebook and receiving incoming calls has been made possible, pressing the task key 122 switches to authentication mode and reference-of the phonebook is allowed if the authentication information is found as identical. In this way, another function can be operated while one function is operated based on the condition that the authentication information is identical, and this can save the operation to switch to another function after having terminated one function, maintain security features, and consequently provide the mobile terminal device 2 of higher convenience.
  • Next, this mobile terminal device 2 will be described with reference to FIGS. 2, 3. FIG. 2 is a front view of the mobile terminal device 2 in an opened state, whereas FIG. 3 is a side view in a closed state. In FIGS. 2, 3, the same symbols are assigned to parts identical to those of FIG. 1.
  • This mobile terminal device 2 includes a first and a second case part 26, 28 respectively, and these case parts 26, 28 are connected to be openable/closable via the open/close mechanism 24. The open/close sensor 10 is disposed on the case parts 26, 28 that are opened by the open/close mechanism 24, and a detection signal for representing an opened or closed state of the case parts 26, 28 is obtained from this open/close sensor 10. When the case parts 26, 28 are folded in the case where lock setting has been set to the mobile terminal device 2 (FIG. 3), a locked-up state (operational restriction state) is brought into by the detection signal from the open/close sensor 10.
  • On the case part 26, various keys 122 to 129 of the input operation part 12, the fingerprint sensor 14, the microphone 18 and others are disposed along with the built-in memory part 4, the processor 6 and others. On the case part 28, the display part 16 and the speaker 20 are disposed along with the built-in antenna 22.
  • According to this mobile terminal device 2, the above-described operations such as calling another function during a phone talk, authentication operation of its authentication information, and operation of said another function can be performed without any alterations to the key arrangement of the existing input operation part 12.
  • Next, the operation of incoming calls and function calling while the open/close lock has been set will be described with reference to FIG. 4. FIG. 4 is a flowchart showing the operation of incoming calls and function calling while the open/close lock has been set. This processing is performed when the case parts 26, 28 are folded.
  • As described above, in this terminal device 2, the operation of incoming calls and phone talk is possible even if operational restriction has been set to its various types of functions. This is a situation in which the power has been turned on; an incoming call is received while operational restriction has been set; and a ring alert occurs (step Si) while the case parts 26, 28 have been folded (FIG. 3). When the user opens the case parts 26, 28 (FIG. 2), then a standby screen is activated and displayed on the display part 16 (step S2). With this state, the user starts a phone talk (step S3), and a screen showing that the phone talk is in progress is displayed (step S4). That is, the user can recognize that the phone talk is still in progress.
  • During this phone talk, for example, pressing the task key 122 (step S5) as a specific key of the input operation part 12 starts another function calling other than the phone talk function. In order to shift to that function, a judgment is made whether or not the open/close lock (operational restriction) has been set (step S6); if the lock has been set, authentication screen is displayed on the display part 16 (step S7); the user enters authentication information by following the instruction displayed on the authentication screen (step S8); and a judgment is made whether or not the entered authentication information is correct (step S9). In this authentication processing, it is judged whether or not the entered authentication information is identical to the previously registered authentication information by using the previously registered authentication information as a reference. If identical, then the authentication completes; the operational restriction is released; the function is activated (step S10); and the screen showing its operation is displayed (step S11). If the operational restriction has not been set, the procedure moves from step S6 to step S10.
  • The user can operate this function during phone talk, and when the user finishes operating this function (step S12), a judgment is made whether or not the phone talk is over (step S13). If the phone talk is still taking place, then the procedure moves to step S4 to display the screen showing that the phone talk is in progress; and then returns to the standby screen of step S2 when the phone talk is over.
  • According to such processing, the user can receive incoming calls with the mobile terminal device 2 in an opened state (FIG. 3) and, for example, can refer to the phonebook during the phone talk. In addition, when the user finishes the phone talk, the locked state can be recovered by returning the mobile terminal device 2 to a closed state (FIG. 3) from an opened state (FIG. 2).
  • Next, the operation of incoming calls and function calling while the open/close lock has been set in such a situation where the case parts are opened will be described with reference to FIG. 5. FIG. 5 is a flowchart showing the operation of incoming calls and function calling while the open/close lock has been set.
  • If incoming calls are received while the case parts 26, 28 are kept open (FIG. 2), the processing shown as the flowchart in FIG. 5 is executed. That is, when the case parts 26, 28 are kept open, the standby screen is displayed on the display part 16 (step S21). When a ring alert occurs with this state (step S22); the user starts a phone talk (step S23); and a screen showing that the phone talk is in progress is displayed (step S24). It has been already described that the user can recognize that the phone talk function is still in progress.
  • During this phone talk, for example, pressing the task key 122 (step S25) as a specific key of the input operation part 12 starts another function calling other than the phone talk function as described above. In order to shift to that function, a judgment is made whether or not the open/close lock (operational restriction) has been set (step S26); if the lock has been set, the authentication screen is displayed on the display part 16 (step S27); the user enters authentication information following the instruction displayed on the authentication screen (step S28); and a judgment is made whether or not the entered authentication information is correct (step S29). In this authentication processing, if the entered authentication information is identical to the previously registered authentication information, then the operational restriction is released; the function is activated (step S30) and the screen showing its operation is displayed (step S31) If the operational restriction has not been set, the procedure moves from step S26 to step S30.
  • The user can operate this function during phone talk, and when the user finishes operating this function (step S32), a judgment is made whether or not the phone talk is over (step S33). If the phone talk is still taking place, then the procedure moves to step S24 to wait for the specific key to be pressed; and returns to the standby screen of step S21 when the phone talk is over.
  • This processing is performed when the user receives an incoming call with the standby screen activated (FIG. 2), and can activate another function by releasing its operational restriction during the phone talk. In addition, when the user finishes the phone talk, the locked-up state can be recovered by returning the mobile terminal device 2 to a closed state (FIG. 3).
  • Next, a series of screens from receiving incoming calls to releasing the open/close lock will be described with reference to FIGS. 6A, 6B, 6C, 6D, 7A, and 7B. FIGS. 6A to 6D are diagrams showing screens of an incoming call while the open/close lock has been set, another function calling, and authentication information input and the like, whereas FIG. 7A is a diagram showing a screen that the open/close lock is released, and 7B is a diagram showing a menu screen after the open/close lock has been released.
  • If an incoming call is received while the open/close lock has been set, a screen 50 for indicating the incoming call is displayed on the display part 16 as shown in FIG. 6A. On this screen 50, a lock icon 52 for indicating that the open/close lock has been set; a message “receiving a call”, the phone number of the caller and others are displayed.
  • When the user starts the phone talk, a screen 54 for indicating that the phone talk is in progress is displayed on the display part 16 as shown in FIG. 6B. On this screen 54, a message “phone talk is in progress” and the phone number of the caller are displayed. This screen 54 may also display the name of the caller and other information.
  • During this phone talk, pressing the task key 122 (FIG. 2) shown in FIG. 6C brings up an input screen 56 for entering authentication information as shown in FIG. 6D. On this input screen 56, a text indicating that “fingerprint authentication” is selected; and an image 58 for instructing how to use the fingerprint authentication method as well as a message “Enter your fingerprint or PIN number” is displayed as a guide message 60 for prompting input of authentication information.
  • When the user enters fingerprints or a PIN number in response to this guide message, then a screen 62 for indicating a release of the open/close lock is displayed on the display part 16 as shown in FIG. 7A. On this screen 62, “Open/close lock has been released” is displayed as a message 64 for indicating the current state.
  • Following the screen 62 for indicating that the open/close lock has been released, a menu selection screen 66 for indicating a menu of functions from which the operational restriction has been released is displayed on the display part 16 as shown in FIG. 7B. On this menu selection screen 66, various types of functions different from the phone talk function are displayed as selectable menu. For example, such functions as “Multi-access, Mail, Phonebook, List of applications...” are displayed. “Multi-access” indicates that activation and operation of another function that is selected is available while operating one function, for example, while operating the phone talk function. In this situation, for example, putting a cursor 68 on the “phonebook” and pressing the decision key 124 unfolds the phonebook data on the display part 16. In this way, the user can reference the phonebook during the phone talk. If the user selects a different function, then that function is operated. When the user finishes using these functions, the screen 54 indicating that the phone talk is in progress is displayed as shown in FIG. 6B, and the standby screen is brought back when the user finishes the phone talk.
  • With such a series of screen and guide information displays, the user can operate another function easily by releasing its lock during the phone talk.
  • Next, the operation of function calling while the open/close lock has been set will be described with reference to FIG. 8. FIG. 8 is a flowchart showing the operation of function calling while the open/close lock has been set.
  • When the case parts 26, 28 are opened, the standby screen is displayed on the display part 16 (step S41). On this standby screen, the lock icon 52 for indicating the open/close lock has been set is displayed if the lock is applied. In this standby state, when the user operates function calling, the function calling is accepted (step S42), followed by a judgment that the open/close lock has been set or not (step S43).
  • If the open/close lock has been set, then the authentication screen is displayed on the display part 16 (step S44); and the user is prompted with input of authentication information. When the user enters the authentication information by following the guide (step S45); then a judgment is made whether or not the entered authentication information is correct (step S46). If the entered authentication information is identical to the previously registered authentication information, then the open/close lock is released and the selected function is activated (step S47); and the screen showing its operation is displayed (step S48). If the operational restriction has not been set, the procedure moves from step S43 to step S47. If the authentication information is judged as incorrect in step S46, then the standby screen in step S41 is brought back. After the authentication processing has completed successfully and the function has been activated, a judgment is made whether or not the function is finished (step S49), and the standby screen is brought back after the completion of the function (step S41).
  • According to this configuration, a certain function can be called from the standby screen, and when the lock has been set to the function, the function can be activated and operated through its authentication processing. As described above, without terminating the operation of the function, the mobile terminal device 2 can be put into a locked-up state by folding it to a closed state (FIG. 3).
  • Next, the operation of another function calling while one function is operated will be described with reference to FIG. 9. FIG. 9 is a flowchart showing the operation of another function calling while one function is operated.
  • Steps S51 to S58 show the operation of one function, and steps S60 to S66 show the operation of another function while operating said one function. In this operation, operational restriction may have been set to any of the functions in steps S60 to S66. This is a situation in which the operation of another function calling is accepted while operating one function and in which operational restriction is released from said another function in the case if any operational restrictions have been put thereon.
  • The standby screen is displayed on the display part 16 of the mobile terminal device 2 in a standby state (step S51). With this state, when the user executes one function calling (step S52), then a judgment is made whether it has been locked or not (step S53); if it has been locked, then the authentication screen is displayed on the display part 16 (step S54); and the user is prompted with input of authentication information. When the user enters the authentication information by following the guide (step S55); then a judgment is made whether or not the entered authentication information is correct (step S56). If the entered authentication information is identical to the previously registered authentication information, then the lock is released and the selected function is activated (step S57); and the screen showing its operation is displayed (step S58). If the function has not been locked in step S53, the procedure shifts from step S53 to step S57 to activate the function.
  • If the authentication information is judged as incorrect in step S56, then the standby screen in step S51 is brought back. After the authentication processing has completed successfully and the function has been activated, the management program 422 monitors whether or not the ongoing function is finished (step S59), and brings back the standby screen at the end of the function (step S51).
  • By the way, if another function calling occurs while operating one function (step S60), then a judgment is made whether or not the function has been locked (step S61). If the function has been locked, then authentication screen is displayed on the display part 16 (step S62); and the user is prompted with input of authentication information. When the user enters the authentication information by following the guide (step S63); then a judgment is made whether or not the entered authentication information is correct (step S64). If the entered authentication information is identical to the previously registered authentication information, then the lock is released and said another function is activated (step S65); and the screen showing its operation is displayed (step S66). If said another function has not been locked in step S61, the procedure shifts from step S61 to step S65 to activate said another function.
  • If the authentication information is judged as incorrect in step S64, then the screen showing the operation of the ongoing function in step 58 is displayed. After the authentication processing has completed successfully and said another function has been activated, the management program 422 monitors whether or not said another function is finished (step S67), and shifts to the screen showing the ongoing operation at the end of said another function (step S58), making it ready for calling other functions.
  • According to this configuration, another function can be called while the operation of one function continues, and if the lock function has been applied to said another function being called, that is, if operational restriction has been put thereon, then said another function can be activated and operated through input of its authentication information and judgment of its correctness. Since the activation of this latter function is realized by an interrupt-service in the middle of processing the former function, so when the latter function finishes, the procedure returns to the previous function to continue its operation. Furthermore in this embodiment, by putting the mobile terminal device 2 back into a closed state (FIG. 3), the lock function can be applied again. The electronic devices such as the mobile terminal device 2 comprising such features can operate multiple functions simultaneously with no decline in security features and operability.
  • Second Embodiment
  • A second embodiment of the present invention will be described with reference to FIGS. 10, 11. FIG. 10 is a block diagram of a mobile terminal device 2 according to a second embodiment. FIG. 11 is a diagram showing a specific configuration example of the mobile terminal device. In FIGS. 10, 11, the same symbols are assigned to parts identical to those of FIGS. 1, 2.
  • The mobile terminal device 2 of this embodiment includes a lock key 123 in place of the open/close sensor 10 (FIG. 1). According to this configuration, pressing the lock key 123 activates the lock function and puts operational restriction. That is, this lock key 123 executes the activation of the lock function in the lock set/release program 428 stored in the program storage part 42. Other configurations are the same as those of the mobile terminal device 2 of the first embodiment.
  • Such a mobile terminal device 2 is not equipped with the open/close mechanism 24 (FIG. 1), and comprised of a single case part 27. The lock key 123 is disposed on this case part 27. The input operation part 12 and the display part 16 and others that are disposed separately on the case parts 26, 28 are arranged on the single case part 27. Each configuration is the same as those of the mobile terminal device 2 of the first embodiment (FIG. 2).
  • Also in this configuration, the above-described operations shown in FIGS. 4, 5, screen displays shown in FIGS. 6A to 7B, and operations shown in FIGS. 8, 9 can be performed. That is, while operational restriction has been set by operating the lock key 123, the processing such as accepting incoming calls and activating one function; calling another function during the incoming calls or while operating said one function; and activating and operating said another function through its authentication processing is enabled, so that there is an advantage that complicated key operations are not required.
  • Other Embodiments
  • In the above-described first embodiment, the mobile terminal device 2 comprising the fingerprint sensor 14 (FIGS. 1, 2) was exemplified. However, as shown in FIG. 12, the mobile terminal device 2 can be configured without the fingerprint sensor 14, by enabling the release of operational restriction through a secret number such as a PIN number.
  • In the above-described embodiments, the mobile terminal device 2 was exemplified as an electronic device; however, as shown in FIG. 13, the present invention can also be applied to a PC (personal computer) 70. In FIGS. 13, the same symbols are assigned to parts identical to those of FIGS. 1, 2. This PC 70 is constructed such that the case part 26 and the case part 28 are disposed to be openable/closeable via the open/close mechanism 24, and on the case part 26, the above-described open/close sensor 10 is disposed. That is, it is also possible to configure the PC 70 to activate its lock mechanism by detecting an open/close state. In addition, in this PC 70, disposing the task key 122 as a specific key provides, as described above, the capability of calling another function on which operational restriction has been put while one function is operated; enables to activate and then operate said another function after its authentication processing is completed; and can enhance security features for the PC 70 as well.
  • Further, the present invention can also be applied to a PDA (Personal Digital Assistant) 72 shown in FIG. 14. As has been described with reference to FIGS. 10, 11, the PDA can be configured to include the lock function along with the lock key 123. Such a configuration provides, as described above, the capability of calling another function on which operational restriction has been put while one function is operated; enables to activate and then operate said another function after its authentication processing is completed; and can enhance security features for the PDA 72 as well.
  • Further, the present invention can also be applied to a camera 74 shown in FIG. 15. As has been described with reference to FIGS. 10, 11, the camera can be configured to include the lock function along with the lock key 123. Such a configuration provides, as described above, the capability of calling another function, for example, edit function on which operational restriction has been put that becomes effective while one function such as photo shooting mode is operated; enables to activate and then operate the edit function after its authentication processing is completed. Thus the camera 74 can be also provided with enhanced security features against deletion or falsification of its photographed data.
  • Further, the present invention can be applied to such as a game machine as well. For example, by enabling the game machine to call another game function on which operational restriction has been put while one game function is operated; and to activate and then operate said another game function after its authentication processing is completed, the game machine can be provided with enhanced security features against deletion or falsification of information set to the game.
  • In the above-described embodiments, the mobile terminal device 2, the PC 70, the PDA 72, the camera 74, and the game machine were exemplified as electronic devices. However, the present invention can also be applied to various types of electronic devices capable of operating multiple functions simultaneously and capable of setting operational restriction for the functions, other than the above-described ones.
  • In the above-described embodiments, a situation was exemplified in which the mobile terminal device 2 that has been locked by the open/close lock mechanism could start a phone talk when it receives incoming calls, and could operate another function such as address book reference during a phone talk. However, it is also possible to configure the mobile terminal device 2 in such a way that the mobile terminal device 2 that is playing a game as an example of one function can start a phone talk immediately after it receives incoming calls, or can start a phone talk after it requests authentication information followed by a verification of correctness of the provided authentication information.
  • In the above-described embodiments, the open/close lock function that was interlocked with the open/close mechanism 24 (first embodiment), and the lock function activated by operating the lock key 123 (second embodiment) were exemplified. However, regarding the electronic devices such as the mobile terminal device 2 operateing multiple functions simultaneously, it is also possible to configure the devices in such a way that the lock function can be activated not only by the open/close mechanism 24 and the lock key 123, but also by detecting the absence of operations by the user for a certain time period.
  • A most preferred embodiment and the like of the present invention have been described above. However, the present invention is not limited to the above description; it goes without saying that various modifications and alterations may be made by a person skilled in the art on the basis of the gist of the invention that is described in the claims and disclosed in the detailed description of the invention, and that such modifications and alterations are included in the scope of the present invention.
  • The present invention relates to an electronic device capable of operating multiple functions simultaneously and capable of setting operational restriction, and is useful such that it enables to operate another function through authentication information matching; to realize simultaneous operation of multiple functions without degrading usability and security; and to increase level of convenience for electronic devices.

Claims (9)

1. An electronic device capable of operating another function while operating one function and capable of setting operational restriction for each function, comprising ‘a control part that accepts said another function calling while operating said one function, and that releases operational restriction based on a judgment of authentication information in the case where the operational restriction has been set to said another function being called.
2. The electronic device of claim 1, further comprising an authentication information input part in order to input authentication information.
3. The electronic device of claim 1, wherein the control part further judges whether or not the entered authentication information matches the registered authentication information.
4. The electronic device of claim 1, further comprising an operation part used for the function calling.
5. The electronic device of claim 1, wherein the control part further outputs display information prompting for input of authentication information in the case where a function calling is accepted.
6. An operational restriction control method of an electronic device capable of operating another function while operating one function and capable of setting operational restriction for each function, comprising the processing of:
accepting said another function calling while operating said one function;
judging authentication information in the case where operational restriction has been set to said another function being called; and
releasing the operational restriction based on the judgment of the authentication information.
7. The operational restriction control method of an electronic device of claim 6, further comprising the processing of outputting display information prompting for input of authentication information used as a reference in order to release the operational restriction.
8. An operational restriction control program of an electronic device capable of operating another function while operating one function and capable of setting operational restriction for each function, the program to be executed by a computer, comprising the steps of:
accepting said another function calling while operating said one function;
judging authentication information in the case where operational restriction has been set to said another function being called; and
releasing the operational restriction based on the judgment of the authentication information.
9. The operational restriction control program of an electronic device of claim 8, further comprising the step of outputting display information prompting for input of authentication information used as a reference in order to release the operational restriction.
US11/239,401 2005-04-18 2005-09-30 Electronic device, operational restriction control method thereof and operational restriction control program thereof Abandoned US20060234764A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2005119890A JP2006303701A (en) 2005-04-18 2005-04-18 Electronic equipment, and method and program of controlling operation suppression thereof
JP2005-119890 2005-04-18

Publications (1)

Publication Number Publication Date
US20060234764A1 true US20060234764A1 (en) 2006-10-19

Family

ID=35923803

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/239,401 Abandoned US20060234764A1 (en) 2005-04-18 2005-09-30 Electronic device, operational restriction control method thereof and operational restriction control program thereof

Country Status (5)

Country Link
US (1) US20060234764A1 (en)
EP (1) EP1715663A3 (en)
JP (1) JP2006303701A (en)
KR (1) KR20060109808A (en)
CN (1) CN1855956A (en)

Cited By (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070273658A1 (en) * 2006-05-26 2007-11-29 Nokia Corporation Cursor actuation with fingerprint recognition
US20080016371A1 (en) * 2006-07-14 2008-01-17 Arachnoid Biometrics Identification Group Corp. System and Method for Registering a Fingerprint, for Setting a Login Method of an Application, and for Logining in the Application
US20080305771A1 (en) * 2007-06-06 2008-12-11 Nec Corporation Mobile terminal, and program and method for preventing unauthorized use of mobile terminal
US20090291711A1 (en) * 2008-05-22 2009-11-26 Mstar Semiconductor, Inc. Protection Setting Method and Protection Releasing Method for Portable Device
US20090311991A1 (en) * 2008-06-16 2009-12-17 Samsung Electronics Co. Ltd. Mobile terminal and method for protecting personal information thereof
US20100103102A1 (en) * 2008-10-27 2010-04-29 Htc Corporation Displaying method and display control module
US20100191953A1 (en) * 2007-07-12 2010-07-29 Minoru Sugiyama Electronic apparatus, information output method and program
JP2014052910A (en) * 2012-09-07 2014-03-20 Fujitsu Ltd Operation control program, portable electronic apparatus, and operation control method
CN104079721A (en) * 2014-06-26 2014-10-01 北京百纳威尔科技有限公司 Terminal contact person security processing method and device
US20150257004A1 (en) * 2014-03-07 2015-09-10 Cellco Partnership D/B/A Verizon Wireless Symbiotic biometric security
US9191477B2 (en) 2011-09-27 2015-11-17 Kyocera Corporation Electronic device
US9819676B2 (en) 2012-06-29 2017-11-14 Apple Inc. Biometric capture for unauthorized user identification
US9832189B2 (en) 2012-06-29 2017-11-28 Apple Inc. Automatic association of authentication credentials with biometrics
US9959539B2 (en) 2012-06-29 2018-05-01 Apple Inc. Continual authorization for secured functions
US10212158B2 (en) 2012-06-29 2019-02-19 Apple Inc. Automatic association of authentication credentials with biometrics
JP2019075152A (en) * 2007-09-24 2019-05-16 アップル インコーポレイテッドApple Inc. Embedded authentication system in electronic device
US10331866B2 (en) 2013-09-06 2019-06-25 Apple Inc. User verification for changing a setting of an electronic device
US20190370583A1 (en) * 2017-09-09 2019-12-05 Apple Inc. Implementation of biometric authentication
US10510097B2 (en) 2011-10-19 2019-12-17 Firstface Co., Ltd. Activating display and performing additional function in mobile terminal with one-time user input
US10521579B2 (en) 2017-09-09 2019-12-31 Apple Inc. Implementation of biometric authentication
US10735412B2 (en) 2014-01-31 2020-08-04 Apple Inc. Use of a biometric image for authorization
US10748153B2 (en) 2014-05-29 2020-08-18 Apple Inc. User interface for payments
US10749967B2 (en) 2016-05-19 2020-08-18 Apple Inc. User interface for remote authorization
US10783576B1 (en) 2019-03-24 2020-09-22 Apple Inc. User interfaces for managing an account
US10803281B2 (en) 2013-09-09 2020-10-13 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US10860096B2 (en) 2018-09-28 2020-12-08 Apple Inc. Device control using gaze information
US11037150B2 (en) 2016-06-12 2021-06-15 Apple Inc. User interfaces for transactions
US11074572B2 (en) 2016-09-06 2021-07-27 Apple Inc. User interfaces for stored-value accounts
US11100349B2 (en) 2018-09-28 2021-08-24 Apple Inc. Audio assisted enrollment
US11170085B2 (en) 2018-06-03 2021-11-09 Apple Inc. Implementation of biometric authentication
US11200309B2 (en) 2011-09-29 2021-12-14 Apple Inc. Authentication with secondary approver
US11209961B2 (en) 2012-05-18 2021-12-28 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US20220012351A1 (en) * 2016-04-29 2022-01-13 Wells Fargo Bank, N.A. Real-time feature level software security
US11321731B2 (en) 2015-06-05 2022-05-03 Apple Inc. User interface for loyalty accounts and private label accounts
US11481769B2 (en) 2016-06-11 2022-10-25 Apple Inc. User interface for transactions
US11574041B2 (en) 2016-10-25 2023-02-07 Apple Inc. User interface for managing access to credentials for use in an operation
US11676188B2 (en) 2013-09-09 2023-06-13 Apple Inc. Methods of authenticating a user
US11676373B2 (en) 2008-01-03 2023-06-13 Apple Inc. Personal computing device control using face detection and recognition
US11783305B2 (en) 2015-06-05 2023-10-10 Apple Inc. User interface for loyalty accounts and private label accounts for a wearable device
US11816194B2 (en) 2020-06-21 2023-11-14 Apple Inc. User interfaces for managing secure operations
US11947711B1 (en) * 2016-04-29 2024-04-02 Wells Fargo Bank, N.A. Real-time feature level software security

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102007010043A1 (en) * 2007-02-20 2008-08-21 Fujitsu Siemens Computers Gmbh Pocket personal computer e.g. smartphone, has device lock engaged in energy saving condition, where computer remains in energy saving condition when device lock is activated and input takes place over keyboard or application keys
JP5359864B2 (en) * 2007-03-13 2013-12-04 日本電気株式会社 Mobile terminal and function control method thereof
US8045518B2 (en) * 2007-03-23 2011-10-25 Innovative Sonic Limited Method of deactivating high-speed downlink operation in CELL—FACH state for a wireless communications system and related apparatus
JP5335090B2 (en) * 2009-08-27 2013-11-06 京セラ株式会社 Mobile device
JP5353659B2 (en) * 2009-11-26 2013-11-27 日本電気株式会社 Mobile terminal device and incoming call response method
US8583097B2 (en) 2011-03-23 2013-11-12 Blackberry Limited Method for conference call prompting from a locked device
EP2503768B1 (en) * 2011-03-23 2018-04-11 BlackBerry Limited Conference call prompting by a locked device
CN102185955A (en) * 2011-04-29 2011-09-14 信源通科技(深圳)有限公司 Mobile terminal with security function and security method thereof
JP5289510B2 (en) * 2011-06-06 2013-09-11 株式会社東芝 Information processing apparatus and lock setting method
EP3089064A1 (en) * 2015-04-08 2016-11-02 LG Electronics Inc. Mobile terminal and method for controlling the same

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6668322B1 (en) * 1999-08-05 2003-12-23 Sun Microsystems, Inc. Access management system and method employing secure credentials
US20040257196A1 (en) * 2003-06-20 2004-12-23 Motorola, Inc. Method and apparatus using biometric sensors for controlling access to a wireless communication device
US20050197103A1 (en) * 2004-02-26 2005-09-08 Nec Corporation Mobile phone with restriction on use thereof and method for restricting use of mobile phone
US20060075224A1 (en) * 2004-09-24 2006-04-06 David Tao System for activating multiple applications for concurrent operation
US20060160576A1 (en) * 2003-03-05 2006-07-20 Sanyo Electric Co., Ltd. Broadcast reception device

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1130934A1 (en) * 2000-02-29 2001-09-05 Koninklijke Philips Electronics N.V. Radiotelephone having a keyboard locking function with a password
JP2002027092A (en) * 2000-07-13 2002-01-25 Hitachi Kokusai Electric Inc Portable terminal
JP2003091509A (en) * 2001-09-17 2003-03-28 Nec Corp Personal authentication method for portable communication equipment and program describing the same
JP4313013B2 (en) * 2002-09-18 2009-08-12 富士通株式会社 Portable terminal device, information processing method thereof, and information processing program thereof
JP3751927B2 (en) * 2002-10-11 2006-03-08 Necアクセステクニカ株式会社 Voice information notification method for mobile phone and mobile phone with voice information notification function using the same
JP4044562B2 (en) * 2003-04-15 2008-02-06 富士通株式会社 Electronic equipment
JP4002535B2 (en) 2003-04-28 2007-11-07 京セラ株式会社 Mobile communication terminal
JP2005057654A (en) * 2003-08-07 2005-03-03 Sharp Corp Portable information terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6668322B1 (en) * 1999-08-05 2003-12-23 Sun Microsystems, Inc. Access management system and method employing secure credentials
US20060160576A1 (en) * 2003-03-05 2006-07-20 Sanyo Electric Co., Ltd. Broadcast reception device
US20040257196A1 (en) * 2003-06-20 2004-12-23 Motorola, Inc. Method and apparatus using biometric sensors for controlling access to a wireless communication device
US20050197103A1 (en) * 2004-02-26 2005-09-08 Nec Corporation Mobile phone with restriction on use thereof and method for restricting use of mobile phone
US20060075224A1 (en) * 2004-09-24 2006-04-06 David Tao System for activating multiple applications for concurrent operation

Cited By (74)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070273658A1 (en) * 2006-05-26 2007-11-29 Nokia Corporation Cursor actuation with fingerprint recognition
US20080016371A1 (en) * 2006-07-14 2008-01-17 Arachnoid Biometrics Identification Group Corp. System and Method for Registering a Fingerprint, for Setting a Login Method of an Application, and for Logining in the Application
US20080305771A1 (en) * 2007-06-06 2008-12-11 Nec Corporation Mobile terminal, and program and method for preventing unauthorized use of mobile terminal
US9031533B2 (en) * 2007-06-06 2015-05-12 Nec Corporation Mobile terminal, and program and method for preventing unauthorized use of mobile terminal
US20100191953A1 (en) * 2007-07-12 2010-07-29 Minoru Sugiyama Electronic apparatus, information output method and program
US8219718B2 (en) * 2007-07-12 2012-07-10 Nec Corporation Electronic apparatus, information output method and program
US10956550B2 (en) 2007-09-24 2021-03-23 Apple Inc. Embedded authentication systems in an electronic device
JP2019075152A (en) * 2007-09-24 2019-05-16 アップル インコーポレイテッドApple Inc. Embedded authentication system in electronic device
US11468155B2 (en) 2007-09-24 2022-10-11 Apple Inc. Embedded authentication systems in an electronic device
US11676373B2 (en) 2008-01-03 2023-06-13 Apple Inc. Personal computing device control using face detection and recognition
US20090291711A1 (en) * 2008-05-22 2009-11-26 Mstar Semiconductor, Inc. Protection Setting Method and Protection Releasing Method for Portable Device
US8600350B2 (en) * 2008-05-22 2013-12-03 Mstar Semiconductor, Inc. Protection setting method and protection releasing method for portable device
US8265596B2 (en) * 2008-06-16 2012-09-11 Samsung Electronics Co., Ltd. Mobile terminal and method for protecting personal information thereof
US20090311991A1 (en) * 2008-06-16 2009-12-17 Samsung Electronics Co. Ltd. Mobile terminal and method for protecting personal information thereof
US20100103102A1 (en) * 2008-10-27 2010-04-29 Htc Corporation Displaying method and display control module
US9191477B2 (en) 2011-09-27 2015-11-17 Kyocera Corporation Electronic device
US11755712B2 (en) 2011-09-29 2023-09-12 Apple Inc. Authentication with secondary approver
US11200309B2 (en) 2011-09-29 2021-12-14 Apple Inc. Authentication with secondary approver
US11551263B2 (en) 2011-10-19 2023-01-10 Firstface Co., Ltd. Activating display and performing additional function in mobile terminal with one-time user input
US10896442B2 (en) 2011-10-19 2021-01-19 Firstface Co., Ltd. Activating display and performing additional function in mobile terminal with one-time user input
US10510097B2 (en) 2011-10-19 2019-12-17 Firstface Co., Ltd. Activating display and performing additional function in mobile terminal with one-time user input
US11209961B2 (en) 2012-05-18 2021-12-28 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US9819676B2 (en) 2012-06-29 2017-11-14 Apple Inc. Biometric capture for unauthorized user identification
US9832189B2 (en) 2012-06-29 2017-11-28 Apple Inc. Automatic association of authentication credentials with biometrics
US9959539B2 (en) 2012-06-29 2018-05-01 Apple Inc. Continual authorization for secured functions
US10212158B2 (en) 2012-06-29 2019-02-19 Apple Inc. Automatic association of authentication credentials with biometrics
JP2014052910A (en) * 2012-09-07 2014-03-20 Fujitsu Ltd Operation control program, portable electronic apparatus, and operation control method
US10331866B2 (en) 2013-09-06 2019-06-25 Apple Inc. User verification for changing a setting of an electronic device
US11494046B2 (en) 2013-09-09 2022-11-08 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs
US11768575B2 (en) 2013-09-09 2023-09-26 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs
US10803281B2 (en) 2013-09-09 2020-10-13 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US11287942B2 (en) 2013-09-09 2022-03-29 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces
US11676188B2 (en) 2013-09-09 2023-06-13 Apple Inc. Methods of authenticating a user
US10735412B2 (en) 2014-01-31 2020-08-04 Apple Inc. Use of a biometric image for authorization
US9503894B2 (en) * 2014-03-07 2016-11-22 Cellco Partnership Symbiotic biometric security
US20150257004A1 (en) * 2014-03-07 2015-09-10 Cellco Partnership D/B/A Verizon Wireless Symbiotic biometric security
US10902424B2 (en) 2014-05-29 2021-01-26 Apple Inc. User interface for payments
US10977651B2 (en) 2014-05-29 2021-04-13 Apple Inc. User interface for payments
US10748153B2 (en) 2014-05-29 2020-08-18 Apple Inc. User interface for payments
US11836725B2 (en) 2014-05-29 2023-12-05 Apple Inc. User interface for payments
US10796309B2 (en) 2014-05-29 2020-10-06 Apple Inc. User interface for payments
CN104079721A (en) * 2014-06-26 2014-10-01 北京百纳威尔科技有限公司 Terminal contact person security processing method and device
US11783305B2 (en) 2015-06-05 2023-10-10 Apple Inc. User interface for loyalty accounts and private label accounts for a wearable device
US11321731B2 (en) 2015-06-05 2022-05-03 Apple Inc. User interface for loyalty accounts and private label accounts
US11734708B2 (en) 2015-06-05 2023-08-22 Apple Inc. User interface for loyalty accounts and private label accounts
US20220012351A1 (en) * 2016-04-29 2022-01-13 Wells Fargo Bank, N.A. Real-time feature level software security
US11947710B2 (en) * 2016-04-29 2024-04-02 Wells Fargo Bank, N.A. Real-time feature level software security
US11947711B1 (en) * 2016-04-29 2024-04-02 Wells Fargo Bank, N.A. Real-time feature level software security
US11206309B2 (en) 2016-05-19 2021-12-21 Apple Inc. User interface for remote authorization
US10749967B2 (en) 2016-05-19 2020-08-18 Apple Inc. User interface for remote authorization
US11481769B2 (en) 2016-06-11 2022-10-25 Apple Inc. User interface for transactions
US11037150B2 (en) 2016-06-12 2021-06-15 Apple Inc. User interfaces for transactions
US11900372B2 (en) 2016-06-12 2024-02-13 Apple Inc. User interfaces for transactions
US11074572B2 (en) 2016-09-06 2021-07-27 Apple Inc. User interfaces for stored-value accounts
US11574041B2 (en) 2016-10-25 2023-02-07 Apple Inc. User interface for managing access to credentials for use in an operation
US10521579B2 (en) 2017-09-09 2019-12-31 Apple Inc. Implementation of biometric authentication
US11765163B2 (en) 2017-09-09 2023-09-19 Apple Inc. Implementation of biometric authentication
US10872256B2 (en) * 2017-09-09 2020-12-22 Apple Inc. Implementation of biometric authentication
US11386189B2 (en) 2017-09-09 2022-07-12 Apple Inc. Implementation of biometric authentication
US20190370583A1 (en) * 2017-09-09 2019-12-05 Apple Inc. Implementation of biometric authentication
US10783227B2 (en) 2017-09-09 2020-09-22 Apple Inc. Implementation of biometric authentication
US11393258B2 (en) 2017-09-09 2022-07-19 Apple Inc. Implementation of biometric authentication
US11170085B2 (en) 2018-06-03 2021-11-09 Apple Inc. Implementation of biometric authentication
US11928200B2 (en) 2018-06-03 2024-03-12 Apple Inc. Implementation of biometric authentication
US11809784B2 (en) 2018-09-28 2023-11-07 Apple Inc. Audio assisted enrollment
US11100349B2 (en) 2018-09-28 2021-08-24 Apple Inc. Audio assisted enrollment
US11619991B2 (en) 2018-09-28 2023-04-04 Apple Inc. Device control using gaze information
US10860096B2 (en) 2018-09-28 2020-12-08 Apple Inc. Device control using gaze information
US11688001B2 (en) 2019-03-24 2023-06-27 Apple Inc. User interfaces for managing an account
US11669896B2 (en) 2019-03-24 2023-06-06 Apple Inc. User interfaces for managing an account
US11610259B2 (en) 2019-03-24 2023-03-21 Apple Inc. User interfaces for managing an account
US11328352B2 (en) 2019-03-24 2022-05-10 Apple Inc. User interfaces for managing an account
US10783576B1 (en) 2019-03-24 2020-09-22 Apple Inc. User interfaces for managing an account
US11816194B2 (en) 2020-06-21 2023-11-14 Apple Inc. User interfaces for managing secure operations

Also Published As

Publication number Publication date
JP2006303701A (en) 2006-11-02
EP1715663A2 (en) 2006-10-25
CN1855956A (en) 2006-11-01
EP1715663A3 (en) 2008-10-29
KR20060109808A (en) 2006-10-23

Similar Documents

Publication Publication Date Title
US20060234764A1 (en) Electronic device, operational restriction control method thereof and operational restriction control program thereof
US7310540B2 (en) Personal communicator with flip element display
JP5213353B2 (en) COMMUNICATION TERMINAL, COMMUNICATION TERMINAL CONTROL METHOD, COMMUNICATION DEVICE, AND COMMUNICATION DEVICE CONTROL METHOD
US8311511B2 (en) Data privacy on wireless communication terminal
WO2007091436A1 (en) Mobile terminal, control method for mobile terminal, control program for mobile terminal, and recording medium
JP3707417B2 (en) Mobile terminal having dial lock function
JP2006115043A (en) Mobile terminal device and program
US8285323B2 (en) Communication device and method for input interface auto-lock thereof
JP2000341392A (en) Communication terminal
KR100650680B1 (en) Mobile communication terminal having a data detail locking function and controlling method therefore
JP2004128780A (en) Cellular phone having key lock function
JP3649908B2 (en) Dial lock release method in mobile communication terminal
JP2006277467A (en) Personal digital assistant
JP2009268034A (en) Portable terminal device
JP2006066975A (en) Portable communication terminal
JP4070221B2 (en) Mobile communication terminal
JP4002535B2 (en) Mobile communication terminal
JP2005347986A (en) Personal digital assistant device
JP2010045454A (en) Cellular phone
JP3927903B2 (en) Portable information terminal device and control method thereof
JP4287385B2 (en) Communication terminal device and control method thereof
KR100446513B1 (en) Method for realizing memo function in mobile terminal
JP2006054581A (en) Method of controlling keylock, electronic apparatus and computer program
KR100808413B1 (en) Character input method for mobile communication device
JP4458365B2 (en) Communication terminal

Legal Events

Date Code Title Description
AS Assignment

Owner name: FUJITSU LIMITED, JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GAMO, TATSUYA;TANOUE, TATSUYA;KIKUCHI, YOSHIAKI;AND OTHERS;REEL/FRAME:017061/0171;SIGNING DATES FROM 20050907 TO 20050908

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION